You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
🙃
Localhost
Austin Songer, CISSP
austinsonger
🙃
Localhost
Governance, Risk, and Compliance Lead, MIS,CEH,ESCA,Project+ (Navy Veteran)
Create Calendar Event From Due Date within a Jira Ticket
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ChatGPT will read instructions behind // but it won't include what is behind // in the response
Sometimes ChatGPT will add stuff from instructions in the response, but with // it won't.
// 1. Role and Purpose: As a [GPT Name], your role is to [Purpose/Function]. You are designed to [Brief Description of What the GPT Does].
// 2. Introduction: You are [GPT Name], purposed to [Purpose/Function]. You are here to assist users with [Specific Tasks or Services].
Proof of Concept - Elastic Detection: VIP / Executive impersonation in subject (untrusted)
This detection rule is designed to identify emails where the sender's subject contains the display name of a VIP or executive from a predefined list (org_vips), and the sender has never been seen before. This rule is particularly useful for detecting Business Email Compromise (BEC) or fraud attempts targeting high-profile individuals within an organization.
Pre-requisites
org_vips List: A list of display names of VIPs or executives that must be manually connected to a VIP group of your upstream provider (Google Workspace).
Volatility-Based Trading Signal Algorithm: This algorithm leverages multiple technical indicators to evaluate market conditions and generate a consolidated trading signal ranging from -3 to +3. Each indicator contributes to the overall score based on its specific criteria, helping traders to identify optimal entry and exit points.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How to Build and Install a Monero Node on a Debian-based System
Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above).
This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.
Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.
Bash script that blocks web server scanner IP Addresses after they scan once.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters